Government must fix 'dysfunctional' policy on cybersecurity

MPs have said the 'chaotic' response to data breaches is undermining national security


Government policy for responding to data breaches is "inconsistent and dysfunctional" and is undermining confidence in the nations ability to defend against cyber attacks, according to MPs.

Despite the increasing frequency of cyber attacks against UK businesses, there appears to have been no attempt to coordinate the "alphabet soup" of government security agencies, according to a report by the Commons Public Accounts Committee.

Advertisement - Article continues below

The report argues that a shortage of digital skills and the government's "chaotic" handling of data breaches are putting the nation at risk.

"Government has a vital role to play in cybersecurity across society but it needs to raise its game," said Committee chair and Labour MP Meg Hillier."Its approach to handling personal data breaches has been chaotic and does not inspire confidence in its ability to take swift, coordinated and effective action in the face of higher-threat attacks."

"The threat of cybercrime is ever-growing yet evidence shows Britain ranks below Brazil, South Africa and China in keeping phones and laptops secure. In this context it should concern us all that the government is struggling to ensure its security profession has the skills it needs," added Hillier.

The UK has seen a rise in cybercrime over the past few years, with significant attacks against Tesco bank, Northern Lincolnshire and Goole NHS Trust, and Sage.

Advertisement - Article continues below
Advertisement - Article continues below

In November a 17-year-old teenageradmitted to the hack of telecoms company TalkTalk in 2015, in which 157,000 users had their data leaked online.

Inconsistent and dysfunctional

The report claims that government has "little oversight of the costs and performance of government information assurance projects and processes for recording departmental personal data breaches are inconsistent and dysfunctional".

The Cabinet Office consistently fails to analyse government security performance on a routine basis, and that self-reporting processes "vary widely". Guidance for what should be recorded is insufficient and many departments fail to report lower level data breaches, including the delivery of letters containing sensitive information to the wrong address.

Without a "consistent approach" to security breaches, the government is unable to make informed decisions about where to direct and prioritise its attention".

"The Public Accounts Committee report highlights the long overdue rationalisation of cybersecurity roles and functions across Government," said David Ferbrache, technical director at KPMG cyber security. "There can be a natural tendency for governments to cloak discussions around security in secrecy but when it comes to cybersecurity, the best response is a community response that involves industry. The NCSC must be agile, flexible and unconventional - and it can only achieve that by drawing on talent from the community as a whole."

The report calls for the government to develop a new strategy for the new National Cyber Security Centre by the end of the financial year. This should include "who it will support, what assistance it will provide and how it will communicate with organisations needing assistance."

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now



University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020
Policy & legislation

Senators propose a bill aimed at ending warrant-proof encryption

24 Jun 2020

Most Popular

Business operations

Nvidia overtakes Intel as most valuable US chipmaker

9 Jul 2020

How to find RAM speed, size and type

24 Jun 2020

The best server solution for your SMB

26 Jun 2020